Skip to main content

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images

  • Conference paper
Digital Watermarking (IWDW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3304))

Included in the following conference series:

Abstract

Invertible authentication techniques have been used in some special applications (such as medical or military applications), where original data can be recovered after being authenticated. In this paper, we proposed a new scheme combine features (relation of coefficients) in DCT domain with content features (edges or textures) of JPEG image into multi-feature, which is useful to authenticate images in both spatial and frequency domains. A novel invertible data embedding mechanism based on random walk is proposed. Experimental results show that the algorithm is sensitive to intended tampers while accepting appropriate JPEG recompressions, and even more, it has the ability to locate corrupt areas. Compared with authentication scheme based on features extracted from single domain, the “miss alarm” probability of our scheme is much lower.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.-Y., Chang, S.-F.: Issues and Solutions for Authenticating MPEG Video. In: SPIE Conf. on Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, vol. 3657, pp. 54–65 (1999)

    Google Scholar 

  2. Fridrich, J., Goljan, M., Du, R.: Invertible Authentication Watermark for JPEG Images. In: ITCC 2001, Las Vegas, Nevada, April 2-4, pp. 223–227 (2001)

    Google Scholar 

  3. Honsinger, C.W., Jones, P., Rabbani, M., Stoffel, J.C.: Lossless Recovery of an Original Image Containing Embedded Data. US Patent 6, 278, 791 (August 2001)

    Google Scholar 

  4. Bhattacharjee, S., Kutter, M.: Compression Tolerant Image Authentication. In: IEEE International Conf. on Image Processing, Chicago (October 1998)

    Google Scholar 

  5. Queluz, M.P.: Content-based Integrity Protection of Digital Images. In: SPIE Conf. on Security and Watermarking of Multimedia Contents, San Jose, CA, January 1999, vol. 3657, pp. 85–93 (1999)

    Google Scholar 

  6. Tian, J.: Wavelet-based reversible watermarking for authentication. In: Proc. Security and Watermarking of Multimedia Contents IV, Electronic Imaging 2002, January 20-25, vol. 4675, pp. 679–690 (2002)

    Google Scholar 

  7. Vleeschouwer, C.D., Delaigle, J.F., Macq, B.: Circular Interpretation of Bijective Transformations in lossless Watermarking for Media Asset Management. In: IEEE Transaction on Multimedia (March 2003)

    Google Scholar 

  8. Awrangjeb, M., Kankanhalli, M.S.: Lossless Watermarking Considering the Human Visual System. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 581–592. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Deng-Pan, Y., Yao-Bin, M., Yue-Wei, D., Zhi-Quan, W. (2005). A Multi-feature Based Invertible Authentication Watermarking for JPEG Images. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31805-7_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24839-2

  • Online ISBN: 978-3-540-31805-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics